International Journal of Knowledge-based and Intelligent Engineering Systems
Latest Publications


TOTAL DOCUMENTS

486
(FIVE YEARS 96)

H-INDEX

13
(FIVE YEARS 2)

Published By Ios Press

1875-8827, 1327-2314

Author(s):  
Aravind Karrothu ◽  
Jasmine Norman

Light-weight cryptography is a major research area due to the minimization of the size of the devices utilized for such services. The associated security threats do increase as their applications are more now. Identity-Based Encryption (IBE) with its wide range of cryptographic schemes and protocols is specifically found suitable for low-end devices that have much resource constraint. This work describes various schemes and protocols in IBE. In this paper an analysis of IBE schemes and the various attacks they are prone to are discussed. The future trends are found to be very promising and challenging.


Author(s):  
M. Somasundara Rao ◽  
Koduganti Venkata Rao ◽  
M.H.M. Krishna Prasad

Database Management Systems (DBMS) are regularly used to store and process touchy endeavour information. In any case, it is beyond the realm of imagination to expect to verify the information by depending on the entrance control and security instruments of such frameworks alone; clients may handle their benefits or go around security systems to malevolently adjust and get to the information. Hence, we have developed a reliable, secure, and real-time data damage tracking Quarantine and recovery scheme using Customized ANN approach. The proposed DTQR scheme recovers the accurate data from any newer data and eliminates the fraudulent data. The approach also provides a solution for runtime problems occurring in the DBMS. Moreover, the proposed technique implemented in the working platform of JAVA and the results are analyzed with existing techniques to prove the efficiency of the proposed system.


Author(s):  
J. Hyma ◽  
M. Rama Krishna Murty ◽  
A. Naveen

The advancements in modern technologies permit the invention of various digital devices which are controlled and activated by people’s gestures, touch and even by one’s voice. Google Assistant, iPhone Siri, Amazon Alexa etc., are most popular voice enabled devices which have grabbed the attention of digital gadget users. Their usage definitely makes the life easier and comfortable. The other side of these smart enabled devices is incredible violation of the privacy. This happens due to their continuous listening to the user and data transmission over a public network to the third-party services. The work proposed in this paper attempts to overcome the existing privacy violation problem with the voice enabled devices. The main idea is to incorporate an intelligent privacy assistant that works based on the user preferences over their data.


Author(s):  
Poovarasan Selvaraj ◽  
E. Chandra

In Speech Enhancement (SE) techniques, the major challenging task is to suppress non-stationary noises including white noise in real-time application scenarios. Many techniques have been developed for enhancing the vocal signals; however, those were not effective for suppressing non-stationary noises very well. Also, those have high time and resource consumption. As a result, Sliding Window Empirical Mode Decomposition and Hurst (SWEMDH)-based SE method where the speech signal was decomposed into Intrinsic Mode Functions (IMFs) based on the sliding window and the noise factor in each IMF was chosen based on the Hurst exponent data. Also, the least corrupted IMFs were utilized to restore the vocal signal. However, this technique was not suitable for white noise scenarios. Therefore in this paper, a Variant of Variational Mode Decomposition (VVMD) with SWEMDH technique is proposed to reduce the complexity in real-time applications. The key objective of this proposed SWEMD-VVMDH technique is to decide the IMFs based on Hurst exponent and then apply the VVMD technique to suppress both low- and high-frequency noisy factors from the vocal signals. Originally, the noisy vocal signal is decomposed into many IMFs using SWEMDH technique. Then, Hurst exponent is computed to decide the IMFs with low-frequency noisy factors and Narrow-Band Components (NBC) is computed to decide the IMFs with high-frequency noisy factors. Moreover, VVMD is applied on the addition of all chosen IMF to remove both low- and high-frequency noisy factors. Thus, the speech signal quality is improved under non-stationary noises including additive white Gaussian noise. Finally, the experimental outcomes demonstrate the significant speech signal improvement under both non-stationary and white noise surroundings.


Author(s):  
K. Manikandan ◽  
E. Chandra

Speaker Identification denotes the speech samples of known speaker and it identifies the best matches of the input model. The SGMFC method is the combination of Sub Gaussian Mixture Model (SGMM) with the Mel-frequency Cepstral Coefficients (MFCC) for feature extraction. The SGMFC method minimizes the error rate, memory footprint and also computational throughput measure needs of a medium-vocabulary speaker identification system, supposed for preparation on a transportable or otherwise. Fuzzy C-means and k-means clustering are used in the SGMM method to attain the improved efficiency and their outcomes with parameters such as precision, sensitivity and specificity are compared.


Author(s):  
P.V.G.D. Prasad Reddy

Age-Related Macular Degeneration (ARMD) is a medical situation resulting in blurred or no vision in the middle of the eye view. Though this disease doesn’t make the person completely blind, it makes it very difficult for the person to perform day to day activities like reading, driving, recognizing people etc. This paper aims to detect ARMD though Optical Coherence Tomography (OCT) scans where the drusen in the macula is detected and identify the infected. The images are first passed though Directional Total Variation (DTV) Denoising followed by Active contour algorithm to mark the boundaries of the layers in macula. In deep learning, a convolutional neural network is a class of deep neural networks, most commonly applied to analyzing visual imagery. Then these images categorized as healthy and infected using Convolution Neural Network. Different CNN variant algorithms like Alexnet, VggNet and GoogleNet have been compared in the experiments and the results obtained are better compared to traditional methods.


Author(s):  
Hongjun Wang

This paper is a research of interval-valued fuzzy and Muirhead Mean algorithms. We deduced new algorithms named as hesitant interval-valued fuzzy Muirhead Mean (HIVFMM) and hesitant interval-valued fuzzy Muirhead Mean (HIVFWMM) with Muirhead Mean algorithms based on Hesitant interval-valued fuzzy set (HIVFS). Firstly, we introduced some concepts and operation laws of HIVFS and the formula form of MM, then we combined them both and gave the proof process of properties and theorems, a mathematic model applying to MADM and a numerical example was given to illustrate the effectively and practically.


Author(s):  
T.V. Madhusudhana Rao ◽  
Suribabu Korada ◽  
Y. Srinivas

The speaker identification in Teleconferencing scenario, it is important to address whether a particular speaker is a part of a conference or not and to note that whether a particular speaker is spoken at the meeting or not. The feature vectors are extracted using MFCC-SDC-LPC. The Generalized Gamma Distribution is used to model the feature vectors. K-means algorithm is utilized to cluster the speech data. The test speaker is to be verified that he/she is a participant in the conference. A conference database is generated with 50 speakers. In order to test the model, 20 different speakers not belonging to the conference are also considered. The efficiency of the model developed is compared using various measures such as AR, FAR and MDR. And the system is tested by varying number of speakers in the conference. The results show that the model performs more robustly.


Author(s):  
Sandeep Samantaray ◽  
Abinash Sahoo

Accurate prediction of water table depth over long-term in arid agricultural areas are very much important for maintaining environmental sustainability. Because of intricate and diverse hydrogeological features, boundary conditions, and human activities researchers face enormous difficulties for predicting water table depth. A virtual study on forecast of water table depth using various neural networks is employed in this paper. Hybrid neural network approach like Adaptive Neuro Fuzzy Inference System (ANFIS), Recurrent Neural Network (RNN), Radial Basis Function Neural Network (RBFN) is employed here to appraisal water levels as a function of average temperature, precipitation, humidity, evapotranspiration and infiltration loss data. Coefficient of determination (R2), Root mean square error (RMSE), and Mean square error (MSE) are used to evaluate performance of model development. While ANFIS algorithm is used, Gbell function gives best value of performance for model development. Whole outcomes establish that, ANFIS accomplishes finest as related to RNN and RBFN for predicting water table depth in watershed.


Sign in / Sign up

Export Citation Format

Share Document